51
Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Embed Size (px)

Citation preview

Page 1: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

CAPITAL FORMATION AND STRUCTURE

Domain Refresher Training iNautix

Page 2: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

COURSE OBJECTIVEBusiness Entity and TypesLearn About Capital : Meaning, Significance and TypesSource of capital and Capital StructureCapital Markets : Primary & Secondary MarketEquities, Financial ratios Stock Exchange IPO, IPO Process & Regulations Concept of UnderwritingGlobal Capital

2

Page 3: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

BUSINESS ENTITY & TYPES

Business Entity is an enterprise which is formed by an individual or group of individuals for fulfillment of business agenda

TYPES OF ENTITIES: Sole Proprietorship Partnership Corporation

3

Page 4: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

SOLE PROPRIETOR ENTITIES

CHARACTERISTICS One owner Unlimited liability Personal income taxes on the profits

ADVANTAGES Profits go directly to the owner Simple structure form of doing business

DISADVANTAGES Unlimited liability can be risky Harder to raise a capital When the owner dies, the business ceases to exist

4

Page 5: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

PARTNERSHIP ENTITIES

CHARACTERISTICS 2 or more partners Liability shared among partners Personal income taxes on the profits

ADVANTAGES Profits shared by the owner Owners share liability

DISADVANTAGES Decision making is complicated Difficult to raise capital Many titles causes problem of authority

5

Page 6: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

THE CORPORATION / COMPANY

A business entity recognized by law with existence separate and distinct from its owners.

6

A corporation

can

Enter into contracts

Buy, Sell or hold property

Borrow money

Hire and fire employees

Sue and be sued

Page 7: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

ADVANTAGES OF THE CORPORATE FORM OF BUSINESS

7

ADVANTAGES OF THE CORPORATE FORM OF

BUSINESS

Limited liability

Easy capital Generation

Professional management

Separation of owners and

entity

Continuous existence

Easy transfer of ownership

Page 8: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

DISADVANTAGES OF THE CORPORATE FORM OF BUSINESS*

8

Governmentalregulation

DoubleTaxation (Corp tax +Div Tax)

Complex StructureEntrenched, inefficientmanagement

Page 9: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

CAPITAL

DEFINITION IN BUSINESS TERMS: Cash which can help in putting up manufacturing plants, Retail Stores, buy goods or services which can help business to deliver to its agenda.

9

As for every country capital city is the heart of the country like wise Capital is the heart of every business organization. Thus it is of the highest significance.

DEFINITION IN ECONOMIC TERMS: A factor of production that is not wanted for itself but for its ability to help in producing other goods.

Page 10: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

TYPES OF CAPITAL & SOURCE OF CAPITAL

Cash Capital and Non Cash Capital are two major categories of capital deployed for business

10

Cash Capital Non Cash Capital

Equity Human Capital

Debt Intellectual Capital

Page 11: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

SOURCE OF CAPITAL

THE TWO MAJOR AND MOST PREFERRED SOURCES OF FUNDS FOR ANY CORPORATION ARE

DebtEquity

DEBT – The corporation borrows the required amount of funds and repays it at a later date along with interest. More like a loan taken by the corporation.

SOURCE: Banks, Govt. Financial Institutions, Financial Institutions (Domestic/Global) etc;

EQUITY – The corporation issues shares to the public and raises money. The ownership of the corporation is diluted.

SOURCE: Individuals, Institutions Investors(Domestic/Global), Public, Venture Capitalists etc;

11

Page 12: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

SIGNIFICANCE OF CAPITAL

Size of business capacity will directly depend on the Quantum of capital invested at Initial stage as well as at various point of business growth phase.

Capital Intensive: Refineries, Mining, Car Plant, Bank etc;

Low Capital Intensive Units: Retail Store, Financial Advisory Boutique Etc;

Low cost of capital is one of the major element which improves cost competitiveness and profitability of the organization

Thus deciding right capital structure is very important for the business operations and profitability

12

Page 13: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

CAPITAL STRUCTURE - DECISION

A company can obtain long-term financing in form of equity, debt or combination of bothCapital Structure is the proportion of debt and equity shares on a firm's balance sheetWhat proportion of debt versus equity maximizes the overall value of the firm ?

13

Page 14: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

WHY DOES AN INSTITUTION NEED MONEY?

Establish New Business Expand Existing Business Pay off Existing Loans Buy other institutions

14

Page 15: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

BASICS : CAPITAL MARKET

A market in which individuals and institutions trade financial securities. Organizations/institutions in the public and private sectors also often sell securities on the capital markets in order to raise funds. Thus, this type of market is composed of both the primary and secondary markets.

Both the stock and bond markets are parts of the capital markets.

PRIMARY MARKET : New stock or bond issues are sold to investors by companies. SECONDARY MARKET : Existing securities are sold and bought among investors or traders

15

Page 16: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

REGULATORY BODIES

Securities and Exchange Commission (SEC) www.sec.gov

• Responsible for administering and enforcing the federal securities laws, and regulating brokerage firms,

investment companies and advisers

• Ensures orderly market performance and information availability to investors

• Establish accounting norms for securities transactions

National Association of Securities Dealers (NASD) www.nasd.com

• Works to aid and safeguard investors by regulating markets, formulating guidelines, facilitating dispute

resolution and monitoring member activiti

Securities and Exchange Board of India ( SEBI) www.sebi.gov.in

• The basic functions of the Securities and Exchange Board of India is to protect the interests of investors in

securities and to promote the development of, and to regulate the securities market and for matters connected

therewith or incidental thereto"

16

Page 17: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

STOCK MARKET PLAYERS BROKER A person or firm that facilitates trades between customers

Acts only as an intermediary and does not assume risks for the trade

Charges commissions

DEALER A person or firm that buys and sells from his or her own inventory of securities as well as for others

Assumes risk for the transactions

Marks securities up or down to make a profit on their transactions

REGISTERED REPRESENTATIVES An individual who has passed the NASD's registration process and is t

therefore licensed to work in the securities industry

Follows NASD rules.

Usually a brokerage firm employee acting as an account executive for clients

Sell to the public; they do not work on exchange floors

OTHER IMPORTANT PLAYERS: Lead Managers- Merchant Bankers- Underwriters – Regulators – Custodian-

Depository Participants- Clearing agents.

17

Page 18: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

RAISING CAPITAL

>Equity- Share Ownership IPO – Initial public offering FPO – Follow-on Public Offering

High return, Liquidity, Capital appreciation, Limited Liability

>Debt- Take Loan Bond Offerings

Low Risk, Poor Hedge against Inflation, Fixed Yield

Page 19: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

WHAT IS EQUITY?

Equity represents ownership in any asset or company after all debts associated with it are paid off.

A share is simply a divided-up unit of the total value or equity of a company.

Example: Suppose that a company ABC Corp issues 100 shares. Out of the 100 shares issued, Mr. X buys 10 shares. Now Mr. X owns 10 percentage of the company ABC Corp.

In accounting terms, the amount of the funds contributed by the owners (the stockholders) plus the retained earnings (or losses). Also referred to as “shareholders’ equity”.

Assets – Liabilities = Shareholders’ Equity

19

Page 20: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

DEBT VS EQUITY

20

Debt Equity

Formal legal contract No legal contract

Fixed maturity date No fixed maturity date

Fixed periodic payments Discretionary

First right to assets in case of default Residual assets

Interest Expense Dividends reduce retained earnings

No voice in management Right to appoint board of director

Page 21: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

COMMON TERMINOLOGY

Authorized Stock – Maximum number of shares that can be issued

Issued Stock – Shares that have been issued and are held by the stock holders

Treasury Stock – Shares that have been bought back or repurchased by the issuer

Outstanding Stock – Shares that are currently available in the open market

OUTSTANDING STOCK = ISSUED STOCK – TREASURY STOCK

AUTHORIZED STOCK = ISSUED STOCK + STOCK NOT ISSUED

21

Page 22: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential22

The maximum number of shares the

corporation may issue as designated in its charter is the authorized number of shares.

AuthorizedShares

Page 23: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential23

Issued shares are authorized shares of stock that have been sold.

Unissued shares are authorized shares of stock that have never been sold.

AuthorizedShares

Page 24: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

24

UnissuedShares

TreasuryShares

OutstandingShares

IssuedShares

Outstanding shares are shares that were sold and issued and are still held by stockholders.

Treasury shares are issued shares that have been reacquired by the corporation.

AuthorizedShares

Page 25: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

COMMON TERMINOLOGY CONTD..

FACE VALUE OR PAR VALUE The nominal value of a share as stated by the issuer No relation to the Market value of the share.

BOOK VALUE The value of an asset as carried on a balance sheet. In general, book value of an asset equals its acquisition cost minus the depreciation

MARKET VALUE OR MARKET PRICE The price at which a share is currently sold or bought in the market

MARKET CAPITALIZATION The total value of the tradable shares of a corporation

Equals market price times the number of shares outstanding

25

Page 26: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

COMMON TERMINOLOGY CONTD..

DIVIDENDS

• Portion of the company’s earnings shared with the stockholders• Decided by the board of directors of the company• Dividends can be both cash or stock.• Important dates

Declaration Date – Board of directors announce dividend Record Date – Determines who receives the Dividend based on records Payment Date – Dividend is paid In-Dividend Date – cum Dividend; Ex-Dividend Date – without Dividend

RETAINED EARNINGS

• Earnings not paid out as dividends but re-invested / used to pay off debts Retained Earnings (RE) = Net Income (NI) – Dividends

26

Page 27: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

RETURNS FROM EQUITY

Equity Returns = Capital Appreciation + Dividends• Capital Appreciation: Growth in value of the stock; depends entirely on the market conditions and

expectations

Example: Suppose an investor buys 100 shares of Reliance for Rs 70,000 at a market price of Rs 700/share. After a few days the market price of Reliance goes up to Rs 720/share. Also the board of directors at Reliance declare a dividend of Rs 10/share.

• Now the returns for the investor would be a capital appreciation of Rs 20/share in addition to the dividend of Rs 10/share. In total the investor would enjoy a return of Rs 30/share or Rs 3000 on his investments.

27

Page 28: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

CORPORATE ACTIONS

REPURCHASE / BUY BACK• Corporations sometimes buy back their own stock• Stock is either retired or kept as treasury stock• Available for re-issuance.• Reasons for buy back

Increase Earnings/share (EPS) & Return on Equity Tax efficient distributions of excess cash to shareholders

BONUS ISSUE• Additional free shares issued to the shareholders• Is not a dividend pay out in the form of shares• Paid out of company’s free reserves• No change in the Face value of the share

28

Page 29: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

CORPORATE ACTIONS CONTD..

STOCK SPLITS

• Existing share is divided in to multiple shares• Increases the number of outstanding shares by that multiple• Face value of the stock is reduced by that multiple• A good sign; but actually no change in real value to the shareholders• Initiated when the share price grows so high that they are too expensive to buy for small investors

REVERSE STOCK SPLIT OR STOCK MERGE

• Existing shares are merged reducing the number of outstanding shares• Bad sign; Done to increase the share’s market price• Reduces the number of shareholders; rest are paid money

29

Page 30: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

CORPORATE ACTIONS CONTD..

EXAMPLE:

BONUS ISSUE: Suppose a company announces a 2 for 1 bonus issue, then every investor who owns a share will receive 2 additional shares. If Mr. X owns 100 shares of Rs 10 face value, then he will now own an additional 200 shares of Rs 10 face value. In total, Mr. X would now own 300 shares of the company of Rs 10 face value.

STOCK SPLIT: Suppose a company announces a 2 for 1 stock split, then every investor who owns a share will receive one additional share. If Mr. X owns 100 shares of Rs 10 face value, then he will now get an additional 100 shares of the company and the face value of each share would come down to Rs 5. Mr. X would now own 200 shares of the company of Rs. 5 face value.

Theoretically, market price of the share in both a bonus issue as well as a Stock Split will decrease in proportion to the number of new shares. But in reality this does not happen.

30

Page 31: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

31

STOCK SPLIT – BREAK A SHARE INTO MULTIPLE SHARES

Shares Before Split

Type ofSplit

Shares After Split

100 2 for 1 200

100 4 for 1 400

100 3 for 2 150

100 1 for 2 50

Objective is to increase liquidity and shareholder valueObjective is to increase liquidity and shareholder value

Page 32: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

FINANCIAL RATIOS

PRICE TO BOOK (P/B )Compare a stock's market value to its book valueCalculated by dividing the current closing price of the stock by the latest book value per share.

P/B Ratio = Total Market Value / (Total Assets – Liabilities)

A lower P/B ratio could mean that the stock is undervaluedGives an idea whether you're paying more for what would be left if the company went bankrupt immediately.

32

Page 33: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

FINANCIAL RATIOS CONTD..

EARNINGS PER SHARE (EPS)Portion of the Net Income (profit) allocated to each outstanding share annually.

EPS = Net Earnings / Outstanding Shares

PRICE-EARNINGS (P/E) RATIO (Price multiple / Earnings Multiple / Multiple)

Company's current share price compared to its per-share earnings

P/E Ratio = Market Value of one share / EPSHigher the P/E lower is the value in comparison to other stocks

Trailing P/E – EPS calculated from last 12 months

Forward P/E or Projected P/E – EPS calculated from projected earnings for next 12 months

33

Page 34: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

FINANCIAL RATIOS CONTD..

RETURN ON EQUITY (ROE)Indicates the returns generated from the money invested by the shareholders

Does not include debt burden or preferred shares; Useful in comparing firms within an industry

Return on Equity = Net Income / Shareholder’s Equity

RETURN ON ASSETS (ROA)Indicates the returns generated from the total assets owned by a company

Shows the efficiency of the management in generating profits relative to its investments / assets

Return on Assets = Net Income / Total Assets

34

Page 35: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

FINANCIAL RATIOS CONTD..

EXAMPLE: ABC Corp recently showed an annual income of Rs 2,000 against its total assets worth Rs 1,00,000. The corporation owes Rs 55,000 to its lenders. The market capitalization of ABC Corp is Rs 50,000 with 1000 outstanding shares. What is the market value and book value of its share? Also calculate P/B, EPS, P/E, RoE and RoA.

> Market Value of each share => Book Value of each share => P/B ratio for the stock => EPS = 2000 / 1000 = > P/E ratio for the stock = = > RoE = => RoA = =

35

50000/1000 = 5045000 / 1000 = 45

50,000 / 45,000 = 1.11

2

50 / 2 25 2000 * 100 / 45000 4.44 %

2000 * 100 / 100000 2%

Page 36: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

STOCK IPO

SALE OF STOCK TO PUBLIC FOR THE FIRST TIME INVOLVES…• Registration statement filed with Regulator ( SEC in US and SEBI in India )• Underwriting - The investment banker functions as an intermediary (Underwriter) between the

issuing corporation and the investors• Underwriter offers stocks to the general public and institutions for sale through selling group

members• Prospectus Issue - Legal documents explaining the financial facts important to an offering; must

precede or accompany sale of primary offering• Issue subscribed to by investors

36

Page 37: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

STOCK IPO PROCESS

37

PREPARATORY STEPS

• Annual Report / Financial Planning

• Business Plan • Banking Memorandum• IPO/ Capital Market

Concept • Valuation Indicators • Presentation of Banks • Selection of group of

underwritters

DUE DILIGENCE

• Legal• Tax• Management• Financial

PROSPECTUS CREATION

• Prospectus Creation• Registration Statement • Review of Drafts

SECONDARY MARKET PHASE

• Greenshoe• Ongoing Investor

Relations • Ongoing Research

MARKETING/BOOK BUILDING

• Dry Run - Road show • Approach of Key

Investors/ Pre Marketing • IOP Presentation • Fixing Price Range

EQUITY STORY / RESEARCH

• Stock Market Strategy • Creation/Distribution of

IPO • Announcement of Stock

Issue

Page 38: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

UNDERWRITING SPREAD

38

Underwriting spread can be a variable factor, ranging from 1% for Federal, State Firms with a Brand name to 10% for private firms which are financially sick.

900

Page 39: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

UNDERWRITERS AND SYNDICATES

A GROUP OF UNDERWRITERS FORM A SYNDICATE TO:• Reduce risk• Distribute the issue quickly

THERE IS NO LIMIT ON THE NUMBER OF UNDERWRITERS FOR A SYNDICATE • More they are, less is the risk.

39

Syndicate

• Underwriter A• Underwriter B• Underwriter C

Page 40: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

FIRM COMMITMENT UNDERWRITING

Syndicate purchases entire issue and attempts to resell to the public Underwriter acts on a principal basis (assumes risk) If equity sold are less than 90%, Underwriter/Syndicate has the option to cancel the Issue.

40

Page 41: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

US REGULATION: SECURITIES ACT OF 1933

Regulates the sale of new issues to the public Disclosure philosophy All new issues must be registered with the SEC unless an exemption applies. Prospectus

41

Page 42: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

THE REGISTRATION PROCESS

42

PHASE #1Pre-Registration

Period

PHASE #2Cooling-Off

Period

PHASE #3Post-Registration

Period

Filing Date

Effective Date

Page 43: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

THE REGISTRATION PROCESS (CONT’D)

43

Pre-

Regi

stration Perio

d

Issuer and underwriter prepare a registration statement that will be sent to SEC

Cooling

-Of

f Perio

d

SEC reviews registration statement (Length of period is 20 days) Preliminary prospectus (red herring) is sent to investorsState securities registration (Blue-Sky Laws)• B

lue-Sky Law- Was first enacted in Kansas in 1910 after the Public fraud by quick gold/oil firms, to protect investors from such frauds.

Post- Regi

stration Perio

d

Confirm sales to public Final prospectus is issued

Page 44: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

REGISTRATION STATEMENT

BACKGROUND ON THE ISSUER• Issuer is the Firm or Company, which plans to raise Capital

BACKGROUND ON THE OFFICERS• Officers are the Board members of the Firm's Management

Amount of money to be raised Use of the proceeds and Risks Preliminary Prospectus

• Contains price range only• Indications accepted• Money cannot be accepted during cooling-off period with preliminary prospectus

44

Page 45: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

EXEMPT SECURITIES

WHY EXEMPT • Cost Issues• Speed Issues• Legal limits to Federal power

EXEMPT SECURITIES (EXAMPLES)• U.S. Government Securities • Agency Securities • Municipal Securities • Commercial Paper

45

Page 46: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

REGULATIONS

RULE 147• Single state offering• Conditions that must be met:• Minimum 80% revenues, assets, and proceeds in state• 100% sold to state residents

REGULATION A• May raise up to $5,000,000 in 12-month period

REGULATION D• Private Placement• No general solicitation or advertising • No more than 35 non-accredited investors

46

Page 47: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

THE GLOBALIZATION OF CAPITAL MARKETS

Capital Limitation Issuers cannot find enough capital domestically (e.g. Nokia, Ericsson) Cost of Capital- Interest rate differentials-issuer/investor Investors looking to diversify- Correlation of markets Currency Issues- Instability, relative valuation, scarcity, repatriation Government Policy -Tax and/or other incentives/disincentives

47

Page 48: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

ACCESSING INTERNATIONAL CAPITAL

48

Benefits

Lower Cost of Funds

Expanded Shareholder Base

Greater Liquidity

Political Considerations- Japan in U.S. Auto Industry, Bilateral Trade Agreement

Costs

Listing Fees

Accounting Issues

Legal Considerations

Regulatory Costs

Taxation

Back Office Difficulties

Page 49: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

CAPITAL STRUCTURE : FEATURES OF CAPITAL

49

Common Stock

Represents Ownership in the company

Voting Rights

Provide Dividends and/or Capital growth

Last priority in case of liquidation of assets

Preferred Stock

Higher claim on assets and earnings

No Voting rights

Specific dividend paid out before common stockholders

Less potential for capital gain.

Bonds

Debt instruments issued by the company and sold to investors

No voting rights

Highest claim to the assets during liquidation

Provide a fixed yield with low risk

Page 50: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential

Questions

50

Page 51: Information Security Identification: Confidential CAPITAL FORMATION AND STRUCTURE Domain Refresher Training iNautix

Information Security Identification: Confidential51

Thank You